ID

VAR-200403-0063


CVE

CVE-2004-0192


TITLE

Symantec Gateway Security Error Page Cross-Site Scripting Vulnerability

Trust: 0.9

sources: BID: 9755 // CNNVD: CNNVD-200403-082

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the Management Service for Symantec Gateway Security 2.0 allows remote attackers to steal cookies and hijack a management session via a /sgmi URL that contains malicious script, which is not quoted in the resulting error page. Symantec's gateway security 5400 Exists in unspecified vulnerabilities.None. The issue is reported to exist due to improper sanitizing of user-supplied data. Successful exploitation of this vulnerability may allow an attacker to steal cookie-based authentication credentials. If an attacker manages to steal a cookie for a valid session, the attacker may leverage the vulnerability to gain management rights to the affected device. Symantec Gateway Security 5400 series is a firewall device developed by Symantec. Remote attackers can use this vulnerability to obtain administrator sensitive information, such as COOKIE information. When a client submits a URL request to be processed by the Symantec Gateway Security service object, if the processed URL does not exist, such as requesting any object in the /sgmi directory, an error page will be returned to The browser is requested, but the data is not sufficiently filtered when generating the content of the error page, so malicious scripts can be executed in the context of the SGS device. Could allow an attacker to hijack the device's administrative session

Trust: 1.98

sources: NVD: CVE-2004-0192 // JVNDB: JVNDB-2004-000715 // BID: 9755 // VULHUB: VHN-8622

AFFECTED PRODUCTS

vendor:symantecmodel:gateway security 5400scope:eqversion:2.0

Trust: 1.6

vendor:シマンテックmodel:gateway security 5400scope: - version: -

Trust: 0.8

vendor:シマンテックmodel:gateway security 5400scope:eqversion: -

Trust: 0.8

vendor:シマンテックmodel:gateway security 5400scope:eqversion:2.0

Trust: 0.8

vendor:symantecmodel:gateway security seriesscope:eqversion:54002.0

Trust: 0.3

sources: BID: 9755 // JVNDB: JVNDB-2004-000715 // CNNVD: CNNVD-200403-082 // NVD: CVE-2004-0192

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-0192
value: MEDIUM

Trust: 1.0

NVD: CVE-2004-0192
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200403-082
value: MEDIUM

Trust: 0.6

VULHUB: VHN-8622
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-0192
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-8622
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-8622 // JVNDB: JVNDB-2004-000715 // CNNVD: CNNVD-200403-082 // NVD: CVE-2004-0192

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2004-000715 // NVD: CVE-2004-0192

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200403-082

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200403-082

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-8622

EXTERNAL IDS

db:NVDid:CVE-2004-0192

Trust: 3.6

db:BIDid:9755

Trust: 2.8

db:JVNDBid:JVNDB-2004-000715

Trust: 0.8

db:CNNVDid:CNNVD-200403-082

Trust: 0.7

db:BUGTRAQid:20040227 SYMANTEC GATEWAY SECURITY MANAGEMENT SERVICE CROSS SITE SCRIPTING

Trust: 0.6

db:XFid:15330

Trust: 0.6

db:SEEBUGid:SSVID-77514

Trust: 0.1

db:EXPLOIT-DBid:23764

Trust: 0.1

db:VULHUBid:VHN-8622

Trust: 0.1

sources: VULHUB: VHN-8622 // BID: 9755 // JVNDB: JVNDB-2004-000715 // CNNVD: CNNVD-200403-082 // NVD: CVE-2004-0192

REFERENCES

url:http://www.securityfocus.com/bid/9755

Trust: 2.5

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/15330

Trust: 1.9

url:http://marc.info/?l=bugtraq&m=107790684732458&w=2

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2004-0192

Trust: 0.8

url:http://marc.theaimsgroup.com/?l=bugtraq&m=107790684732458&w=2

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/15330

Trust: 0.6

url:http://www.symantec.com/avcenter/security/content/2004.03.03.html

Trust: 0.3

url:http://www.symantec.com

Trust: 0.3

url:/archive/1/355555

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=107790684732458&w=2

Trust: 0.1

sources: VULHUB: VHN-8622 // BID: 9755 // JVNDB: JVNDB-2004-000715 // CNNVD: CNNVD-200403-082 // NVD: CVE-2004-0192

CREDITS

Brian Soby, Raytheon※ Brian_J_Soby@raytheon.com

Trust: 0.6

sources: CNNVD: CNNVD-200403-082

SOURCES

db:VULHUBid:VHN-8622
db:BIDid:9755
db:JVNDBid:JVNDB-2004-000715
db:CNNVDid:CNNVD-200403-082
db:NVDid:CVE-2004-0192

LAST UPDATE DATE

2024-08-14T14:48:11.549000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-8622date:2017-07-11T00:00:00
db:BIDid:9755date:2009-07-12T03:06:00
db:JVNDBid:JVNDB-2004-000715date:2024-05-27T02:26:00
db:CNNVDid:CNNVD-200403-082date:2005-10-20T00:00:00
db:NVDid:CVE-2004-0192date:2017-07-11T01:29:57.400

SOURCES RELEASE DATE

db:VULHUBid:VHN-8622date:2004-03-15T00:00:00
db:BIDid:9755date:2004-02-26T00:00:00
db:JVNDBid:JVNDB-2004-000715date:2024-05-27T00:00:00
db:CNNVDid:CNNVD-200403-082date:2004-02-26T00:00:00
db:NVDid:CVE-2004-0192date:2004-03-15T05:00:00